Network anonymity Joel Paulsson Charlotta Westberg Email: {joepa089, chawe049}@student.liu.se Supervisor: David Byers, {
[email protected]} Project Report for Information Security Course Linköpings universitet, Sweden We start by describing what alternative technologies Abstract there are for anonymity, and then we take a closer look at Due to recent happenings in the world, such as the specific software that uses the technology. We have implementation of Internet laws, network anonymity has limited this report to not cover all technologies and become a highly controversial subject. This report is a services for anonymity, for example we chose not to brief inventory of technologies and reasons for anonymity, write about anonymous remailers and chose only to write and is based on literature studies and some basic testing about services that are free. We then discuss the through existing tests. It also covers whether or not difficulties in creating anonymous networks. Finally we anonymous networks truly are anonymous and how present our conclusions. difficult it is to create an anonymous network. While all of 2. Background the different technologies that were tested have a degree of anonymity, some appear more secure than others. Within Anonymous means to be nameless and without this report, it is found to be difficult, if not impossible, to identity. Essentially, this means that anonymity is create a completely anonymous network; though it is untraceable, and the only way to discover such a person possible for the user to hide the fact that he/she is is by coincidence or by the user breaking his own anonymous.